kite 0.0.8 → 0.0.9

Sign up to get free protection for your applications and to get access to all the features.
Files changed (50) hide show
  1. checksums.yaml +4 -4
  2. data/.travis.yml +2 -0
  3. data/CHANGELOG.md +28 -1
  4. data/README.md +33 -4
  5. data/kite.gemspec +2 -0
  6. data/lib/kite.rb +1 -0
  7. data/lib/kite/core.rb +2 -40
  8. data/lib/kite/generate.rb +43 -0
  9. data/lib/kite/helpers.rb +27 -0
  10. data/lib/kite/render.rb +23 -11
  11. data/lib/kite/version.rb +1 -1
  12. data/tpl/aws/README.md +21 -21
  13. data/tpl/aws/bin/base/bootstrap.sh +35 -0
  14. data/tpl/aws/bin/base/cleanup.sh.tt +19 -0
  15. data/tpl/aws/{set-env.sh.erb → bin/base/set-env.sh.tt} +0 -0
  16. data/tpl/aws/{setup-tunnel.sh.erb → bin/base/setup-tunnel.sh.tt} +0 -0
  17. data/tpl/aws/{bosh-install.sh.erb → bin/bosh-install.sh.tt} +2 -2
  18. data/tpl/{gcp/concourse-deploy.sh.erb → aws/bin/concourse-deploy.sh.tt} +0 -0
  19. data/tpl/aws/bin/vault-deploy.sh.tt +10 -0
  20. data/tpl/aws/{deployments/bosh/bosh_vars.yml.tt → bosh-vars.yml.erb} +0 -0
  21. data/tpl/aws/deployments/bosh/cloud-config.yml.tt +2 -1
  22. data/tpl/aws/deployments/concourse/{concourse.yml.erb → concourse.yml.tt} +7 -0
  23. data/tpl/aws/deployments/vault/vault.yml.erb +38 -0
  24. data/tpl/aws/docs/bosh.md +31 -0
  25. data/tpl/aws/docs/concourse.md +30 -0
  26. data/tpl/{gcp → aws/docs}/vault.md +13 -6
  27. data/tpl/aws/terraform/{main.tf → main.tf.tt} +1 -2
  28. data/tpl/aws/terraform/{network.tf → network.tf.tt} +40 -23
  29. data/tpl/aws/terraform/{terraform.tfvars.erb → terraform.tfvars.tt} +2 -0
  30. data/tpl/aws/terraform/variables.tf +8 -0
  31. data/tpl/gcp/README.md +10 -31
  32. data/tpl/gcp/bin/base/bootstrap.sh +35 -0
  33. data/tpl/gcp/bin/base/cleanup.sh.tt +20 -0
  34. data/tpl/gcp/{set-env.sh.erb → bin/base/set-env.sh.tt} +3 -1
  35. data/tpl/gcp/{setup-tunnel.sh.erb → bin/base/setup-tunnel.sh.tt} +3 -1
  36. data/tpl/gcp/{bosh-install.sh.erb → bin/bosh-install.sh.tt} +3 -2
  37. data/tpl/gcp/bin/concourse-deploy.sh.tt +11 -0
  38. data/tpl/gcp/{vault-deploy.sh.erb → bin/vault-deploy.sh.tt} +1 -1
  39. data/tpl/gcp/deployments/bosh/cloud-config.yml.tt +3 -2
  40. data/tpl/gcp/deployments/concourse/{concourse.yml.erb → concourse.yml.tt} +8 -0
  41. data/tpl/gcp/deployments/concourse/test/test-credentials.yml +3 -0
  42. data/tpl/gcp/deployments/concourse/test/test-pipeline.yml +24 -0
  43. data/tpl/gcp/deployments/nginx/nginx.yml.erb +62 -0
  44. data/tpl/gcp/deployments/vault/{vault.yml → vault.yml.erb} +1 -1
  45. data/tpl/gcp/docs/bosh.md +31 -0
  46. data/tpl/gcp/docs/concourse.md +30 -0
  47. data/tpl/gcp/docs/vault.md +33 -0
  48. data/tpl/skel/config/cloud.yml +2 -0
  49. metadata +62 -19
  50. data/tpl/aws/concourse-deploy.sh.erb +0 -17
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: d029f893bc9f787beff2681b15c0b6ab31371b70
4
- data.tar.gz: 406a1dc3d0a397bba6e2dae0983d464a9ce7b791
3
+ metadata.gz: '0499a1f48e1e1ff191047b0a757469b537cebf0a'
4
+ data.tar.gz: c562a68c9cf7c851f5088ac6413a2b7d756e0c65
5
5
  SHA512:
6
- metadata.gz: 4247ff2253a5ff7d392b820cd3cd8c329f8a23159017ca4359072102e2bf57bb2fee91b28401371eb4c658f7cbc390faede99486323b2485b7944f456b54ccd3
7
- data.tar.gz: 1e4593d77af49accd33e8e6341d250e919034da2358610f9c0ddc08bd3b136cbb2180333776aa35d24c797a55131046d18c34dc84f923a6ce8e37782ebe475b8
6
+ metadata.gz: cd0754e76c673d8001452b1c053d76c2e4053d0ce916b5df8ab18a2dc92212c5d3e359376cd70df6d5e1160ee33a5f9529cc5f626eb2e926747cb452d1421f70
7
+ data.tar.gz: 071f54533c2228073440213c31145e42668c510de0fe377f15950fd0c93614575a16abc8a69df9b8e1bf88d553f898c7821a3fe4db5f0991c80529fd98a0dd65
data/.travis.yml CHANGED
@@ -3,3 +3,5 @@ language: ruby
3
3
  rvm:
4
4
  - 2.4.0
5
5
  before_install: gem install bundler -v 1.14.6
6
+ env:
7
+ COVERAGE: true
data/CHANGELOG.md CHANGED
@@ -2,7 +2,31 @@
2
2
 
3
3
  ## [Unreleased](https://github.com/helios-technologies/kite/tree/HEAD)
4
4
 
5
- [Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.7...HEAD)
5
+ [Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.8...HEAD)
6
+
7
+ **Closed issues:**
8
+
9
+ - Move bosh\_vars into config/ [\#31](https://github.com/helios-technologies/kite/issues/31)
10
+
11
+ **Merged pull requests:**
12
+
13
+ - Improved documentation and kite render flow [\#47](https://github.com/helios-technologies/kite/pull/47) ([vshatravenko](https://github.com/vshatravenko))
14
+ - Added Vault manifest for AWS [\#46](https://github.com/helios-technologies/kite/pull/46) ([vshatravenko](https://github.com/vshatravenko))
15
+ - Added nginx manifest for GCP [\#45](https://github.com/helios-technologies/kite/pull/45) ([vshatravenko](https://github.com/vshatravenko))
16
+ - Removed public IPs from GCP BOSH deployments [\#44](https://github.com/helios-technologies/kite/pull/44) ([vshatravenko](https://github.com/vshatravenko))
17
+ - Add codecov report [\#42](https://github.com/helios-technologies/kite/pull/42) ([calj](https://github.com/calj))
18
+ - Add coverage report [\#41](https://github.com/helios-technologies/kite/pull/41) ([calj](https://github.com/calj))
19
+ - Fixes for GCP provider [\#40](https://github.com/helios-technologies/kite/pull/40) ([vshatravenko](https://github.com/vshatravenko))
20
+ - Conditional terraform network resources [\#39](https://github.com/helios-technologies/kite/pull/39) ([vshatravenko](https://github.com/vshatravenko))
21
+ - Fixed moving scripts to tpl/bin [\#38](https://github.com/helios-technologies/kite/pull/38) ([vshatravenko](https://github.com/vshatravenko))
22
+ - Add task generate command [\#37](https://github.com/helios-technologies/kite/pull/37) ([nmuzychuk](https://github.com/nmuzychuk))
23
+ - Added bootstrap and cleanup scripts [\#34](https://github.com/helios-technologies/kite/pull/34) ([vshatravenko](https://github.com/vshatravenko))
24
+ - Fixed AWS terraform.tfvars rendering [\#33](https://github.com/helios-technologies/kite/pull/33) ([vshatravenko](https://github.com/vshatravenko))
25
+ - Moved things in proper places [\#32](https://github.com/helios-technologies/kite/pull/32) ([vshatravenko](https://github.com/vshatravenko))
26
+ - Connected Vault to Concourse [\#23](https://github.com/helios-technologies/kite/pull/23) ([vshatravenko](https://github.com/vshatravenko))
27
+
28
+ ## [v0.0.8](https://github.com/helios-technologies/kite/tree/v0.0.8) (2017-09-22)
29
+ [Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.7...v0.0.8)
6
30
 
7
31
  **Closed issues:**
8
32
 
@@ -59,3 +83,6 @@
59
83
  [Full Changelog](https://github.com/helios-technologies/kite/compare/v0.0.2...v0.0.3)
60
84
 
61
85
  ## [v0.0.2](https://github.com/helios-technologies/kite/tree/v0.0.2) (2017-08-24)
86
+
87
+
88
+ \* *This Change Log was automatically generated by [github_changelog_generator](https://github.com/skywinder/Github-Changelog-Generator)*
data/README.md CHANGED
@@ -1,9 +1,14 @@
1
1
  # Kite
2
2
 
3
3
  [![Build Status](https://travis-ci.org/helios-technologies/kite.svg?branch=master)](https://travis-ci.org/helios-technologies/kite)
4
+ [![codecov](https://codecov.io/gh/helios-technologies/kite/branch/master/graph/badge.svg)](https://codecov.io/gh/helios-technologies/kite)
5
+
4
6
 
5
7
  Kite is a CLI for scaffolding and managing devops modules
6
8
  The main purpose is templating of various tools for devops around terraform, bosh, ansible
9
+ Currently Kite support one Stack on both AWS and GCP.
10
+
11
+ We plan in adding community stack using a simple template repository structure.
7
12
 
8
13
  ## Installation
9
14
 
@@ -23,13 +28,37 @@ Or install it yourself as:
23
28
 
24
29
  ## Usage
25
30
 
26
- To start using kite from scratch:
27
- - Create a new kite project, use `kite new`
31
+ To start using kite for bootstraping your infrastructure
32
+ follow the steps below :
33
+
34
+ ### Create your Infrastructure as Code base repository
35
+
36
+ Create a new kite project using:
37
+
38
+ ```
39
+ $ kite new PROJECT_NAME
40
+ ```
41
+
42
+ ### Configure your cloud and credentials
43
+
28
44
  - Fill out the `config/cloud.yml` file with your credentials.
29
45
  - For BOSH you'll need an SSH key, to generate one, use `ssh-keygen -f *path_to_key*`
30
- - Generate the cloud IaC needed with `kite generate --cloud=*aws or gcp*`
31
- - Continue with instructions from newly generated README.md
32
46
 
47
+ ### Generate your infrastructure using terraform
48
+
49
+ Generate the cloud IaC needed with
50
+
51
+ ```
52
+ $ kite generate --cloud=aws|gcp
53
+ ```
54
+
55
+ you can now review and apply your terraform files.
56
+
57
+ ### Deploy the default stack (BOSH / Concourse / Vault / Kubernetes)
58
+
59
+ Continue with instructions from newly generated README.md
60
+
61
+ ## Getting help
33
62
 
34
63
  To list all Kite commands, use
35
64
 
data/kite.gemspec CHANGED
@@ -25,4 +25,6 @@ Gem::Specification.new do |spec|
25
25
  spec.add_development_dependency "bundler", "~> 1.14"
26
26
  spec.add_development_dependency "rake", "~> 10.0"
27
27
  spec.add_development_dependency "rspec", "~> 3.0"
28
+ spec.add_development_dependency "simplecov"
29
+ spec.add_development_dependency "codecov"
28
30
  end
data/lib/kite.rb CHANGED
@@ -9,5 +9,6 @@ require 'kite/error'
9
9
 
10
10
  require 'kite/base'
11
11
  require 'kite/render'
12
+ require 'kite/generate'
12
13
  require 'kite/core'
13
14
  require 'kite/cloud'
data/lib/kite/core.rb CHANGED
@@ -10,46 +10,8 @@ module Kite
10
10
  target.prepare
11
11
  end
12
12
 
13
- method_option :cloud, type: :string, desc: "Cloud provider", enum: %w{aws gcp}, required: true
14
- desc "generate", "Generate Cloud IaC from configuration"
15
- # Generates Infrastructure as Code and setup scripts for the given cloud using values from <b>config/cloud.yml</b>
16
- def generate()
17
- say "Generating Cloud #{ options[:cloud] } IaC", :green
18
- @values = parse_cloud_config
19
-
20
- case options[:cloud]
21
- when 'aws'
22
- directory('aws/terraform', 'terraform')
23
- copy_file('aws/README.md', 'README.md', force: true)
24
-
25
- template('aws/bosh-install.sh.erb', 'bin/bosh-install.sh')
26
- template('aws/setup-tunnel.sh.erb', 'bin/setup-tunnel.sh')
27
- template('aws/concourse-deploy.sh.erb', 'bin/concourse-deploy.sh')
28
- template('aws/set-env.sh.erb', 'bin/set-env.sh')
29
- chmod('bin/bosh-install.sh', 0755)
30
- chmod('bin/concourse-deploy.sh', 0755)
31
- chmod('bin/setup-tunnel.sh', 0755)
32
-
33
- when 'gcp'
34
- directory('gcp/terraform', 'terraform')
35
- copy_file('gcp/README.md', 'README.md', force: true)
36
-
37
- template('gcp/bosh-install.sh.erb', 'bin/bosh-install.sh')
38
- template('gcp/bosh-vars.yml.erb', 'bosh-vars.yml')
39
- template('gcp/setup-tunnel.sh.erb', 'bin/setup-tunnel.sh')
40
- template('gcp/concourse-deploy.sh.erb', 'bin/concourse-deploy.sh')
41
- template('gcp/vault-deploy.sh.erb', 'bin/vault-deploy.sh')
42
- template('gcp/set-env.sh.erb', 'bin/set-env.sh')
43
- chmod('bin/bosh-install.sh', 0755)
44
- chmod('bin/concourse-deploy.sh', 0755)
45
- chmod('bin/vault-deploy.sh', 0755)
46
- chmod('bin/setup-tunnel.sh', 0755)
47
-
48
- else
49
- say 'Cloud provider not specified'
50
-
51
- end
52
- end
13
+ desc "generate", "Generate IaC from configuration"
14
+ subcommand "generate", Kite::Generate
53
15
 
54
16
  desc 'render MANIFEST', 'Render manifest file from configuration and Terraform output'
55
17
  subcommand "render", Kite::Render
@@ -0,0 +1,43 @@
1
+ module Kite
2
+ # Subcommand for rendering manifests, deployments etc.
3
+ class Generate < Base
4
+ include Kite::Helpers
5
+
6
+ method_option :provider, type: :string, desc: "Cloud provider", enum: %w{aws gcp}, required: true
7
+ desc "cloud", "Generate cloud IaC from configuration"
8
+ # Generates Infrastructure as Code and setup scripts for the given cloud using values from <b>config/cloud.yml</b>
9
+ def cloud()
10
+ say "Generating cloud #{ options[:provider] } IaC", :green
11
+ @values = parse_cloud_config
12
+
13
+ case options[:provider]
14
+ when 'aws'
15
+ directory('aws/terraform', 'terraform')
16
+ copy_file('aws/README.md', 'README.md', force: true)
17
+
18
+ directory('aws/bin/base', 'bin')
19
+ chmod('bin/bootstrap.sh', 0755)
20
+ chmod('bin/cleanup.sh', 0755)
21
+
22
+ when 'gcp'
23
+ directory('gcp/terraform', 'terraform')
24
+ copy_file('gcp/README.md', 'README.md', force: true)
25
+
26
+
27
+ directory('gcp/bin/base', 'bin')
28
+ chmod('bin/bootstrap.sh', 0755)
29
+ chmod('bin/cleanup.sh', 0755)
30
+
31
+ else
32
+ say 'Cloud provider not specified'
33
+
34
+ end
35
+ end
36
+
37
+ method_option :name, type: :string, desc: "Task name", required: true
38
+ desc "task", "Generate task IaC from configuration"
39
+ def task()
40
+ say "Generating task #{ options[:name] } IaC", :green
41
+ end
42
+ end
43
+ end
data/lib/kite/helpers.rb CHANGED
@@ -28,6 +28,33 @@ module Kite::Helpers
28
28
  cloud_config
29
29
  end
30
30
 
31
+ # Return public subnet id depending on
32
+ # whether it's declared in config/cloud.yml or not
33
+ def conditional_subnet_id(values)
34
+ subnet_id = values['aws']['public_subnet']['id']
35
+
36
+ if subnet_id.empty?
37
+ '${aws_subnet.platform_dmz.id}'
38
+ else
39
+ subnet_id
40
+ end
41
+ end
42
+
43
+ # Return vpc id depending on
44
+ # whether it's declared in config/cloud.yml or not
45
+ def conditional_vpc_id(values)
46
+ vpc_id = values['aws']['vpc_id']
47
+
48
+ if vpc_id.empty?
49
+ '${aws_vpc.platform.id}'
50
+ else
51
+ vpc_id
52
+ end
53
+ end
54
+
55
+
56
+
57
+
31
58
  # Returns subnet's IP range slice in a BOSH manifest-compatible way
32
59
  def ip_range(subnet, range)
33
60
 
data/lib/kite/render.rb CHANGED
@@ -10,24 +10,36 @@ module Kite
10
10
  def manifest(type)
11
11
  say "Rendering #{type} manifest", :green
12
12
  @values = parse_cloud_config
13
- @tf_output = parse_tf_state('terraform/terraform.tfstate')
13
+ @tf_output = parse_tf_state('terraform/terraform.tfstate') if options[:cloud] == 'aws'
14
+
15
+ if options[:cloud] == 'aws'
16
+ @private_subnet = IPAddr.new(@values['aws']['private_subnet']['network']).to_range.to_a
17
+ else
18
+ @private_subnet = IPAddr.new(@values['gcp']['subnet_cidr']).to_range.to_a
19
+ end
14
20
 
15
21
  case type
16
22
  when "bosh"
17
- if options[:cloud] == 'aws'
18
- @private_subnet = IPAddr.new(@values['aws']['private_subnet']['network']).to_range.to_a
19
- else
20
- @private_subnet = IPAddr.new(@values['gcp']['subnet_cidr']).to_range.to_a
21
- end
22
-
23
23
  directory("#{options[:cloud]}/deployments/bosh", 'deployments/bosh')
24
+ template("#{options[:cloud]}/bosh-vars.yml.erb", 'config/bosh-vars.yml')
25
+ copy_file("#{options[:cloud]}/docs/bosh.md", "docs/bosh.md")
26
+ template("#{options[:cloud]}/bin/bosh-install.sh.tt", "bin/bosh-install.sh")
27
+ chmod('bin/bosh-install.sh', 0755)
24
28
 
25
29
  when "concourse"
26
- template("#{options[:cloud]}/deployments/concourse/cloud-config.yml.erb", "deployments/concourse/cloud-config.yml")
27
- template("#{options[:cloud]}/deployments/concourse/concourse.yml.erb", "deployments/concourse/concourse.yml")
30
+ directory("#{options[:cloud]}/deployments/concourse", "deployments/concourse")
31
+ copy_file("#{options[:cloud]}/docs/concourse.md", "docs/concourse.md")
32
+ template("#{options[:cloud]}/bin/concourse-deploy.sh.tt", "bin/concourse-deploy.sh")
33
+ chmod('bin/concourse-deploy.sh', 0755)
34
+
28
35
  when "vault"
29
- copy_file("#{options[:cloud]}/deployments/vault/vault.yml", "deployments/vault/vault.yml")
30
- copy_file("#{options[:cloud]}/vault.md", "docs/vault.md")
36
+ template("#{options[:cloud]}/deployments/vault/vault.yml.erb", "deployments/vault/vault.yml")
37
+ copy_file("#{options[:cloud]}/docs/vault.md", "docs/vault.md")
38
+ template("#{options[:cloud]}/bin/vault-deploy.sh.tt", "bin/vault-deploy.sh")
39
+ chmod('bin/vault-deploy.sh', 0755)
40
+
41
+ when "nginx"
42
+ template("#{options[:cloud]}/deployments/nginx/nginx.yml.erb", "deployments/nginx/nginx.yml")
31
43
 
32
44
  else
33
45
  say "Manifest type not specified"
data/lib/kite/version.rb CHANGED
@@ -1,3 +1,3 @@
1
1
  module Kite
2
- VERSION = "0.0.8"
2
+ VERSION = "0.0.9"
3
3
  end
data/tpl/aws/README.md CHANGED
@@ -1,29 +1,29 @@
1
- BOSH Director & Concourse Bootstrap
2
- ===================================
1
+ ## AWS Cloud
3
2
 
4
- This project achieves the following:
3
+ ### Setup
5
4
 
6
- - Preparation of an AWS environment for BOSH & Concourse
7
- - Deployment of a new BOSH Director using bosh-init
8
- - Deployment of a new Concourse cluster, or standalone server
5
+ Apply terraform code
6
+ ```
7
+ pushd terraform && terraform init && terraform apply && popd
8
+ ```
9
9
 
10
- Terraform is used to setup the base network and security infrastructure, including an ELB for Concourse.
10
+ Render BOSH manifest and related files
11
+ ```
12
+ kite render manifest bosh --cloud aws
13
+ ```
11
14
 
12
- Requirements
13
- -----
15
+ Prepare BOSH environment using instructions from [docs/bosh.md](docs/bosh.md)
14
16
 
15
- - Install [terraform](https://www.terraform.io/intro/getting-started/install.html)
16
- - Install [bosh](https://bosh.io/docs/cli-v2.html#install)
17
+ Render Vault deployment
18
+ ```
19
+ kite render manifest vault --cloud aws
20
+ ```
17
21
 
18
- Usage
19
- -----
22
+ Follow instructions from [docs/vault.md](docs/vault.md) to deploy Vault
20
23
 
21
- To deploy a BOSH Director:
22
- - Apply the terraform IaC from `terraform` folder
23
- - Run `source bin/setup-tunnel.sh` to create an SSH CLI tunnel
24
- - Run `kite render manifest bosh --cloud=aws` to render BOSH deployment files
25
- - Run `bin/bosh-install.sh` to deploy the BOSH Director
24
+ Render Concourse manifest
25
+ ```
26
+ kite render manifest concourse --cloud aws
27
+ ```
26
28
 
27
- To access BOSH Director information, use bosh -e *bosh_name* env
28
-
29
- To connect to Bastion over SSH, use ssh jumpbox@*bastion ip* -i jumpbox.key
29
+ Follow instructions from [docs/concourse.md](docs/concourse.md) to deploy Concourse
@@ -0,0 +1,35 @@
1
+ #!/usr/bin/env bash
2
+
3
+ set -xe
4
+
5
+ # Apply Terraform IaC
6
+ pushd terraform
7
+
8
+ terraform init
9
+ terraform apply
10
+
11
+ popd
12
+
13
+ # Set up an SSH tunnel to Bastion
14
+ . bin/setup-tunnel.sh
15
+
16
+ # Render BOSH manifest and related files
17
+ kite render manifest bosh --cloud aws
18
+
19
+ # Deploy BOSH Director
20
+ ./bin/bosh-install.sh
21
+
22
+ # Set the needed environment variables
23
+ . bin/set-env.sh
24
+
25
+ # Render Vault manifest
26
+ kite render manifest vault --cloud aws
27
+
28
+ # Deploy Vault
29
+ ./bin/vault-deploy.sh
30
+
31
+ # Render Concourse manifest and related files
32
+ kite render manifest concourse --cloud aws
33
+
34
+ # Deploy Concourse
35
+ ./bin/concourse-deploy.sh
@@ -0,0 +1,19 @@
1
+ #!/usr/bin/env bash
2
+
3
+ # Remove existing BOSH deployments
4
+ bosh -e <%= @values['bosh']['name'] %> -d concourse deld
5
+
6
+ # Destroy BOSH director
7
+ bosh delete-env deployments/bosh/bosh.yml \
8
+ --state=config/state.json \
9
+ --vars-store=config/creds.yml \
10
+ --vars-file=config/bosh-vars.yml \
11
+ --var-file private_key=<%= @values['kite']['private_key_path'] %> \
12
+ -o deployments/bosh/cpi.yml \
13
+ -o deployments/bosh/jumpbox-user.yml
14
+
15
+ # Destroy Terraform-generated infrastructure
16
+ pushd terraform && terraform destroy && popd
17
+
18
+ # Remove files generated by kite
19
+ rm -rf terraform deployments config/{creds.yml,bosh_vars.yml,jumpbox.key} bin/*.sh
File without changes
@@ -6,7 +6,7 @@ set -xe
6
6
  bosh create-env deployments/bosh/bosh.yml \
7
7
  --state=config/state.json \
8
8
  --vars-store=config/creds.yml \
9
- --vars-file=deployments/bosh/bosh_vars.yml \
9
+ --vars-file=config/bosh-vars.yml \
10
10
  --var-file private_key=<%= @values['kite']['private_key_path'] %> \
11
11
  -o deployments/bosh/cpi.yml \
12
12
  -o deployments/bosh/jumpbox-user.yml
@@ -16,7 +16,7 @@ bosh alias-env <%= @values['bosh']['name'] %> \
16
16
  -e <%= @values['bosh']['static_ip'] %> \
17
17
  --ca-cert <(bosh int ./config/creds.yml --path /director_ssl/ca)
18
18
 
19
- bosh -e <%= @values['bosh']['name'] %> ucc deployments/bosh/cloud_config.yml
19
+ bosh -e <%= @values['bosh']['name'] %> ucc deployments/bosh/cloud-config.yml
20
20
 
21
21
  # Get jumpbox user key
22
22
  bosh int config/creds.yml --path /jumpbox_ssh/private_key > config/jumpbox.key